117 information-security "https:" "https:" positions at Georgetown University in United States
Sort by
Refine Your Search
-
Systems Security Officer, University Information Systems/University Information Security Office - Georgetown University. The ISSO will be responsible for managing the authorizations and risks related
-
Technical Operations Manager, Public Safety Georgetown University Police Department - Georgetown University. This specialized, emergency-essential role is responsible for the oversight and management of all
-
The Threat and Vulnerability Program Manager is a key role within the University Information Security Officer (UISO). This role leads and matures Georgetown’s enterprise-wide cyber threat and
-
in an established code that emphasizes respect for self and others. The Community Director manages the occupancy, safety and security of the residential area they oversee. The Community Director is a
-
community is a close-knit group of remarkable individuals driven by intellectual inquiry, a commitment to social justice, and a shared dedication to making a difference in the world. Requirements Job Overview
-
, alumni, visitors, neighbors) and external agencies (MPD, DCFD, FBI, USSS, etc). The incumbent is often the fact of university safety. Incumbent interacts routinely with students, faculty, staff, parents
-
-solving abilities. Excellent communication, presentation, and interpersonal skills, capable of influencing stakeholders at all levels. Deep understanding of IT infrastructure, applications, and security
-
. The position exists to provide expert physical and technical assistance for network systems, ensuring the reliability, efficiency, and security of IT services across all campuses and international sites
-
for keeping our community proficient in the latest software, hardware, and IT procedures, improving productivity, security and user experience. They will report directly to the Director of IT Communications and
-
The Senior Physical Security Specialist provides informed and researched assessments, analysis, recommendations, and logical recommendations with respect to security countermeasures and mitigation